summaryrefslogtreecommitdiff
path: root/usr/src/uts/common/syscall/uid.c
diff options
context:
space:
mode:
Diffstat (limited to 'usr/src/uts/common/syscall/uid.c')
-rw-r--r--usr/src/uts/common/syscall/uid.c323
1 files changed, 323 insertions, 0 deletions
diff --git a/usr/src/uts/common/syscall/uid.c b/usr/src/uts/common/syscall/uid.c
new file mode 100644
index 0000000000..65bcabcaf0
--- /dev/null
+++ b/usr/src/uts/common/syscall/uid.c
@@ -0,0 +1,323 @@
+/*
+ * CDDL HEADER START
+ *
+ * The contents of this file are subject to the terms of the
+ * Common Development and Distribution License, Version 1.0 only
+ * (the "License"). You may not use this file except in compliance
+ * with the License.
+ *
+ * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
+ * or http://www.opensolaris.org/os/licensing.
+ * See the License for the specific language governing permissions
+ * and limitations under the License.
+ *
+ * When distributing Covered Code, include this CDDL HEADER in each
+ * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
+ * If applicable, add the following below this CDDL HEADER, with the
+ * fields enclosed by brackets "[]" replaced with your own identifying
+ * information: Portions Copyright [yyyy] [name of copyright owner]
+ *
+ * CDDL HEADER END
+ */
+/*
+ * Copyright 2004 Sun Microsystems, Inc. All rights reserved.
+ * Use is subject to license terms.
+ */
+
+/*
+ * Copyright (c) 1984, 1986, 1987, 1988, 1989 AT&T
+ */
+
+#pragma ident "%Z%%M% %I% %E% SMI"
+
+#include <sys/param.h>
+#include <sys/types.h>
+#include <sys/sysmacros.h>
+#include <sys/systm.h>
+#include <sys/tuneable.h>
+#include <sys/cred_impl.h>
+#include <sys/errno.h>
+#include <sys/proc.h>
+#include <sys/signal.h>
+#include <sys/debug.h>
+#include <sys/policy.h>
+#include <sys/zone.h>
+
+int
+setuid(uid_t uid)
+{
+ register proc_t *p;
+ int error;
+ int do_nocd = 0;
+ int uidchge = 0;
+ cred_t *cr, *newcr;
+ uid_t oldruid = uid;
+ zoneid_t zoneid = getzoneid();
+
+ if (uid < 0 || uid > MAXUID)
+ return (set_errno(EINVAL));
+
+ /*
+ * Need to pre-allocate the new cred structure before grabbing
+ * the p_crlock mutex.
+ */
+ newcr = cralloc();
+
+ p = ttoproc(curthread);
+
+retry:
+ mutex_enter(&p->p_crlock);
+ cr = p->p_cred;
+
+ if ((uid == cr->cr_ruid || uid == cr->cr_suid) &&
+ secpolicy_allow_setid(cr, uid, B_TRUE) != 0) {
+ error = 0;
+ crcopy_to(cr, newcr);
+ p->p_cred = newcr;
+ newcr->cr_uid = uid;
+ } else if ((error = secpolicy_allow_setid(cr, uid, B_FALSE)) == 0) {
+ if (!uidchge && uid != cr->cr_ruid) {
+ /*
+ * The ruid of the process is going to change. In order
+ * to avoid a race condition involving the
+ * process-count associated with the newly given ruid,
+ * we increment the count before assigning the
+ * credential to the process.
+ * To do that, we'll have to take pidlock, so we first
+ * release p_crlock.
+ */
+ mutex_exit(&p->p_crlock);
+ uidchge = 1;
+ mutex_enter(&pidlock);
+ upcount_inc(uid, zoneid);
+ mutex_exit(&pidlock);
+ /*
+ * As we released p_crlock we can't rely on the cr
+ * we read. So retry the whole thing.
+ */
+ goto retry;
+ }
+ /*
+ * A privileged process that gives up its privilege
+ * must be marked to produce no core dump.
+ */
+ if (cr->cr_uid != uid ||
+ cr->cr_ruid != uid ||
+ cr->cr_suid != uid)
+ do_nocd = 1;
+ oldruid = cr->cr_ruid;
+ crcopy_to(cr, newcr);
+ p->p_cred = newcr;
+ newcr->cr_ruid = uid;
+ newcr->cr_suid = uid;
+ newcr->cr_uid = uid;
+ ASSERT(uid != oldruid ? uidchge : 1);
+ } else
+ crfree(newcr);
+
+ mutex_exit(&p->p_crlock);
+
+ /*
+ * We decrement the number of processes associated with the oldruid
+ * to match the increment above, even if the ruid of the process
+ * did not change or an error occurred (oldruid == uid).
+ */
+ if (uidchge) {
+ mutex_enter(&pidlock);
+ upcount_dec(oldruid, zoneid);
+ mutex_exit(&pidlock);
+ }
+
+ if (error == 0) {
+ if (do_nocd) {
+ mutex_enter(&p->p_lock);
+ p->p_flag |= SNOCD;
+ mutex_exit(&p->p_lock);
+ }
+ crset(p, newcr); /* broadcast to process threads */
+ return (0);
+ }
+ return (set_errno(error));
+}
+
+int64_t
+getuid(void)
+{
+ rval_t r;
+ cred_t *cr;
+
+ cr = curthread->t_cred;
+ r.r_val1 = cr->cr_ruid;
+ r.r_val2 = cr->cr_uid;
+ return (r.r_vals);
+}
+
+int
+seteuid(uid_t uid)
+{
+ register proc_t *p;
+ int error = EPERM;
+ int do_nocd = 0;
+ cred_t *cr, *newcr;
+
+ if (uid < 0 || uid > MAXUID)
+ return (set_errno(EINVAL));
+
+ /*
+ * Need to pre-allocate the new cred structure before grabbing
+ * the p_crlock mutex.
+ */
+ newcr = cralloc();
+ p = ttoproc(curthread);
+ mutex_enter(&p->p_crlock);
+ cr = p->p_cred;
+
+ if (uid == cr->cr_ruid || uid == cr->cr_uid || uid == cr->cr_suid ||
+ (error = secpolicy_allow_setid(cr, uid, B_FALSE)) == 0) {
+ /*
+ * A privileged process that makes itself look like a
+ * set-uid process must be marked to produce no core dump,
+ * if the effective uid did changed.
+ */
+ if (cr->cr_uid != uid && error == 0)
+ do_nocd = 1;
+ error = 0;
+ crcopy_to(cr, newcr);
+ p->p_cred = newcr;
+ newcr->cr_uid = uid;
+ } else
+ crfree(newcr);
+
+ mutex_exit(&p->p_crlock);
+
+ if (error == 0) {
+ if (do_nocd) {
+ mutex_enter(&p->p_lock);
+ p->p_flag |= SNOCD;
+ mutex_exit(&p->p_lock);
+ }
+ crset(p, newcr); /* broadcast to process threads */
+ return (0);
+ }
+ return (set_errno(error));
+}
+
+/*
+ * Buy-back from SunOS 4.x
+ *
+ * Like setuid() and seteuid() combined -except- that non-root users
+ * can change cr_ruid to cr_uid, and the semantics of cr_suid are
+ * subtly different.
+ */
+int
+setreuid(uid_t ruid, uid_t euid)
+{
+ proc_t *p;
+ int error = 0;
+ int do_nocd = 0;
+ int uidchge = 0;
+ uid_t oldruid = ruid;
+ cred_t *cr, *newcr;
+ zoneid_t zoneid = getzoneid();
+
+ if ((ruid != -1 && (ruid < 0 || ruid > MAXUID)) ||
+ (euid != -1 && (euid < 0 || euid > MAXUID)))
+ return (set_errno(EINVAL));
+
+ /*
+ * Need to pre-allocate the new cred structure before grabbing
+ * the p_crlock mutex.
+ */
+ newcr = cralloc();
+
+ p = ttoproc(curthread);
+
+retry:
+ mutex_enter(&p->p_crlock);
+ cr = p->p_cred;
+
+ if (ruid != -1 && ruid != cr->cr_ruid && ruid != cr->cr_uid &&
+ secpolicy_allow_setid(cr, ruid, B_FALSE) != 0) {
+ error = EPERM;
+ } else if (euid != -1 &&
+ euid != cr->cr_ruid && euid != cr->cr_uid &&
+ euid != cr->cr_suid && secpolicy_allow_setid(cr, euid, B_FALSE)) {
+ error = EPERM;
+ } else {
+ if (!uidchge && ruid != -1 && cr->cr_ruid != ruid) {
+ /*
+ * The ruid of the process is going to change. In order
+ * to avoid a race condition involving the
+ * process-count associated with the newly given ruid,
+ * we increment the count before assigning the
+ * credential to the process.
+ * To do that, we'll have to take pidlock, so we first
+ * release p_crlock.
+ */
+ mutex_exit(&p->p_crlock);
+ uidchge = 1;
+ mutex_enter(&pidlock);
+ upcount_inc(ruid, zoneid);
+ mutex_exit(&pidlock);
+ /*
+ * As we released p_crlock we can't rely on the cr
+ * we read. So retry the whole thing.
+ */
+ goto retry;
+ }
+ crhold(cr);
+ crcopy_to(cr, newcr);
+ p->p_cred = newcr;
+
+ if (euid != -1)
+ newcr->cr_uid = euid;
+ if (ruid != -1) {
+ oldruid = newcr->cr_ruid;
+ newcr->cr_ruid = ruid;
+ ASSERT(ruid != oldruid ? uidchge : 1);
+ }
+ /*
+ * "If the real uid is being changed, or the effective uid is
+ * being changed to a value not equal to the real uid, the
+ * saved uid is set to the new effective uid."
+ */
+ if (ruid != -1 ||
+ (euid != -1 && newcr->cr_uid != newcr->cr_ruid))
+ newcr->cr_suid = newcr->cr_uid;
+ /*
+ * A process that gives up its privilege
+ * must be marked to produce no core dump.
+ */
+ if ((cr->cr_uid != newcr->cr_uid ||
+ cr->cr_ruid != newcr->cr_ruid ||
+ cr->cr_suid != newcr->cr_suid))
+ do_nocd = 1;
+
+ crfree(cr);
+ }
+ mutex_exit(&p->p_crlock);
+
+ /*
+ * We decrement the number of processes associated with the oldruid
+ * to match the increment above, even if the ruid of the process
+ * did not change or an error occurred (oldruid == uid).
+ */
+ if (uidchge) {
+ ASSERT(oldruid != -1 && ruid != -1);
+ mutex_enter(&pidlock);
+ upcount_dec(oldruid, zoneid);
+ mutex_exit(&pidlock);
+ }
+
+ if (error == 0) {
+ if (do_nocd) {
+ mutex_enter(&p->p_lock);
+ p->p_flag |= SNOCD;
+ mutex_exit(&p->p_lock);
+ }
+ crset(p, newcr); /* broadcast to process threads */
+ return (0);
+ }
+ crfree(newcr);
+ return (set_errno(error));
+}